Android reveal dozens of malicious apps

This is the case of a new malware campaign on the Google Play Store For the past few years, cyber-criminals have strengthened their efforts to have malicious applications listed on Google Play Store โ€“ the worldโ€™s most trafficked Android app source. While the platformโ€™s security checks have improved through theโ€ฆ

Read More

2021 top malware strains

The most prolific malware users are cyber criminals This advisory provides details on the top malware strains observed in 2021. Malware, short for โ€œmalicious software,โ€ can compromise a system by performing an unauthorized function or process. Malicious cyber actors often use malware to covertly compromise and then gain access toโ€ฆ

Read More

Wipers and IoT Botnets dominate the threat landscape

The Russia/Ukraine war increased the number of connected devices The latest Operational Technology (OT)/IoT security report from Nozomi Networks Labs finds wiper malware, IoT botnet activity, and the Russia/Ukraine war impacted the threat landscape in the first half of 2022. Since Russia began its invasion of Ukraine in February 2022,โ€ฆ

Read More

Lookout discovers android spyware deployed in Kazakhstan

Sophisticated malware tooling designed to provide surveillance. Lookout, Inc., a leader in endpoint and cloud security solutions, today announced the discovery of an enterprise-grade Android surveillance ware currently used by the government of Kazakhstan within its borders. Lookout researchers also found evidence of deployment of the spyware โ€“ which Lookoutโ€ฆ

Read More

VMware security opportunity

Designing malware customised for manufacturing infrastructure. โ€œIndustrial Control Systems and the manufacturing sector are at the epicentre of a cyber insurgency. Dealing with the disruptions of labour shortages, manufacturers have implemented automation technologies and artificial intelligence to help bring more agility. But while the industrial Internet of Things (IIoT) bringsโ€ฆ

Read More

Malicious cyber activity targeting MSPs

Cybercrime cartels have studied the interdependences of financial institutions. A joint advisory has been published by the U.S., UK, Canada, and ANZ warning of malicious cyber activity targeting MSPs and providing guidance on how best to protect against these cyber threats. VMwareโ€™s recent Modern Bank Heists report, referenced this, revealing 60 per cent of financialโ€ฆ

Read More

Banks, retailers, social media companies and telcos blamed for scam message explosion

Erosion of digital trust, with fed up consumers saying more needs to be done to protect their personal information. Consumers believe banks, retailers and mobile operators need to do more to protect them and their personal information from fraudsters. Trust in these organizations is eroding fast because consumers say theyโ€ฆ

Read More

SentinelOne Roundtable: Minimising risk from cyber threats: focus on reducing time to containment

Sponsored content: Thursday, 24th September 2020 โ€“ Singapore, Malaysia, Philippines Focus Network, in partnership with SentinelOne, brought together leading IT Security executives to discover how they are dealing with the challenges of digital transformation and technology sprawl and how they view the opportunities around security automation such as: Drastically reduceโ€ฆ

Read More

Exabeam Roundtable: Tracking Compromised Accounts & Insider Threats Across Your Network

Sponsored content: Wednesday, 23rd September 2020 โ€“ ASEAN and Hong Kong Focus Network, in partnership with Exabeam, brought leading IT Security executives to discuss where and how to focus the security teamโ€™s efforts to help keep organisations out of the press and better protect from financial loss and drastically reduceโ€ฆ

Read More

BlackBerry offers free reverse tool to help fight cyber crime

Open-source tool to combat reverse engineering malware. BlackBerry Limited has made available a free open-source tool for cyber security professionals, called PE Tree that significantly reduces the time and effort required to reverse engineer malware. Reverse engineering of malware is an extremely time- and labour-intensive process, which can involve hoursโ€ฆ

Read More